Table of Contents:
  • Includes bibliographical references and index
  • Ch. 1. Understanding the threats
  • Ch. 2. Understanding the devices
  • Ch. 3. Exploiting BlackBerry devices
  • Ch. 4. Hacking the supporting BlackBerry infrastructure
  • Ch. 5. Protecting your PC and LAN from BlackBerrys
  • Ch. 6. Exploiting PDAs
  • Ch. 7. Hacking the supporting PDA infrastructure
  • Ch. 8. Protecting your PC and LAN from PDAs
  • Ch. 9. Exploiting cell phones
  • Ch. 10. Protecting the enterprise PC and LAN from cell phones